Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of files or complete system compromise.
Stories by Lucian Constantin
The source code for a trojan that infected hundreds of thousands of internet-of-things devices and used them to launch distributed denial-of-service attacks was published online, paving the way for more such botnets.
Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for crypto-ransomware.
The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.
The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.
Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.
Yahoo is reportedly preparing to confirm a data breach that affects hundreds of millions of accounts.
More than 840,000 Cisco networking devices from around the world are affected by a recently discovered vulnerability that's similar to one exploited by a hacking group believed to be linked to the U.S. National Security Agency.
Aside from new and interesting features, macOS Sierra 10.12 has a large number of important security fixes.
Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers.
Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car.
Cisco Systems has patched a vulnerability similar to one exploited by a cyberespionage group believed to be linked to the U.S. National Security Agency.
Attackers could remotely force Windows computers into Safe Mode in order to bypass pass-the-hash protections and steal user account credentials.
Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies.
A rogue Pokémon Go helper application with over 500,000 downloads on Google Play had Trojan code that downloaded root exploits to take over Android devices.
- Contract Analyst Programmer (CISCO/IT Security) 161028/AP/142 Asia
- Technology Training Manager NSW
- Network Support Specialist ACT
- Senior Consultant Commercial Pricing VIC
- IT Manager - ANZ NSW
- Project Manager - Intelligent Transport Solutions NSW
- QA Test Lead- Digital, Mobile, UX, AGILE, Cloud NSW
- Implementation Manager VIC
- Level 3 Microsoft Resource Engineer VIC
- Network Designer/Consultant VIC